[tor-bugs] #26847 [Applications/Tor Browser]: Tor Browser 8.0, noscript pops up a full-browser-size window to warn me about x-site scripting
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Aug 2 11:11:58 UTC 2019
#26847: Tor Browser 8.0, noscript pops up a full-browser-size window to warn me
about x-site scripting
-------------------------------------------------+-------------------------
Reporter: arma | Owner: tbb-
| team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: tbb-8.0-issues, tbb-regression, | Actual Points:
noscript, tbb-usability |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by ma1):
Replying to [comment:7 mikeperry]:
> Hrmm, this situation does not seem to have improved. Doubleclick is
encoding URLs in like all of its ad query params (probably because of the
referer field not being present for https fetches), and this is getting
triggered multiple times all over the place.
Could you please provide me with some URLs to test for false positives?
I'd very much want to remove them, but unfortuntaley, "regular" NoScript
users (not on the Tor Browser at Medium security settings) are unlikely to
see and report those because doubleclick is blocked by default (pre-XSS
filter) and/or adblocked. Is there any reason for the Tor Browser not
blocking the major tracking / advertising offenders across all its user
base?
Beside tackling false positives, a strategy I'm willing to experiment with
is replacing XSS warning popups with something less obtrusive and
workflow-interrupting: **what about an in-content placeholder, very much
like the click-to-play one**?
Regarding the performance issues, I've already made the filter
asynchronous in the WebExtensions process, which shouldn't block the UI
and content processes but unfortunately doesn't help much with mono-core
processors (poor Intel Atom). I'm not sure WebAssembly would be useful
either, since most of the CPU time is spent on regular expressions
matching, but having real-world cases reported would help optimizing
possibly inefficient ones.
Thank you all for the cooperation.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26847#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list